{"id":"https://openalex.org/W4394855752","doi":"https://doi.org/10.1007/s44163-024-00120-9","title":"Self-healing hybrid intrusion detection system: an ensemble machine learning approach","display_name":"Self-healing hybrid intrusion detection system: an ensemble machine learning approach","publication_year":2024,"publication_date":"2024-04-16","ids":{"openalex":"https://openalex.org/W4394855752","doi":"https://doi.org/10.1007/s44163-024-00120-9"},"language":"en","primary_location":{"id":"doi:10.1007/s44163-024-00120-9","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s44163-024-00120-9","pdf_url":"https://link.springer.com/content/pdf/10.1007/s44163-024-00120-9.pdf","source":{"id":"https://openalex.org/S4210220416","display_name":"Discover Artificial Intelligence","issn_l":"2731-0809","issn":["2731-0809"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Discover Artificial Intelligence","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://link.springer.com/content/pdf/10.1007/s44163-024-00120-9.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5064231211","display_name":"Sauharda Kushal","orcid":null},"institutions":[{"id":"https://openalex.org/I29894533","display_name":"Charles Darwin University","ror":"https://ror.org/048zcaj52","country_code":"AU","type":"education","lineage":["https://openalex.org/I29894533"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Sauharda Kushal","raw_affiliation_strings":["Energy and Resources Institute, Faculty of Science and Technology, Charles Darwin University, Darwin, NT, 0815, Australia"],"affiliations":[{"raw_affiliation_string":"Energy and Resources Institute, Faculty of Science and Technology, Charles Darwin University, Darwin, NT, 0815, Australia","institution_ids":["https://openalex.org/I29894533"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5004069000","display_name":"Bharanidharan Shanmugam","orcid":"https://orcid.org/0000-0002-2591-1949"},"institutions":[{"id":"https://openalex.org/I29894533","display_name":"Charles Darwin University","ror":"https://ror.org/048zcaj52","country_code":"AU","type":"education","lineage":["https://openalex.org/I29894533"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Bharanidharan Shanmugam","raw_affiliation_strings":["Energy and Resources Institute, Faculty of Science and Technology, Charles Darwin University, Darwin, NT, 0815, Australia"],"affiliations":[{"raw_affiliation_string":"Energy and Resources Institute, Faculty of Science and Technology, Charles Darwin University, Darwin, NT, 0815, Australia","institution_ids":["https://openalex.org/I29894533"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5062722514","display_name":"Jawahar Sundaram","orcid":"https://orcid.org/0000-0002-8101-8725"},"institutions":[{"id":"https://openalex.org/I48018076","display_name":"Christ University","ror":"https://ror.org/022tv9y30","country_code":"IN","type":"education","lineage":["https://openalex.org/I48018076"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Jawahar Sundaram","raw_affiliation_strings":["Computer Science and Applications, Christ Academy Institute for Advanced Studies, Bengaluru, India"],"affiliations":[{"raw_affiliation_string":"Computer Science and Applications, Christ Academy Institute for Advanced Studies, Bengaluru, India","institution_ids":["https://openalex.org/I48018076"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5036849751","display_name":"Suresh N. Thennadil","orcid":"https://orcid.org/0000-0001-9392-7857"},"institutions":[{"id":"https://openalex.org/I29894533","display_name":"Charles Darwin University","ror":"https://ror.org/048zcaj52","country_code":"AU","type":"education","lineage":["https://openalex.org/I29894533"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Suresh Thennadil","raw_affiliation_strings":["Energy and Resources Institute, Faculty of Science and Technology, Charles Darwin University, Darwin, NT, 0815, Australia"],"affiliations":[{"raw_affiliation_string":"Energy and Resources Institute, Faculty of Science and Technology, Charles Darwin University, Darwin, NT, 0815, Australia","institution_ids":["https://openalex.org/I29894533"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5064231211"],"corresponding_institution_ids":["https://openalex.org/I29894533"],"apc_list":{"value":990,"currency":"EUR","value_usd":1067},"apc_paid":{"value":990,"currency":"EUR","value_usd":1067},"fwci":3.9592,"has_fulltext":true,"cited_by_count":11,"citation_normalized_percentile":{"value":0.93940235,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"4","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.995199978351593,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7987725734710693},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.710587739944458},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.635013997554779},{"id":"https://openalex.org/keywords/constant-false-alarm-rate","display_name":"Constant false alarm rate","score":0.6304487586021423},{"id":"https://openalex.org/keywords/classifier","display_name":"Classifier (UML)","score":0.5551651120185852},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.5393689870834351},{"id":"https://openalex.org/keywords/anomaly-based-intrusion-detection-system","display_name":"Anomaly-based intrusion detection system","score":0.5300416946411133},{"id":"https://openalex.org/keywords/ensemble-learning","display_name":"Ensemble learning","score":0.47537150979042053},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.4751558005809784},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.45006242394447327},{"id":"https://openalex.org/keywords/false-positive-rate","display_name":"False positive rate","score":0.44651830196380615},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.4232971668243408},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.39498651027679443},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.0881853699684143}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7987725734710693},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.710587739944458},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.635013997554779},{"id":"https://openalex.org/C77052588","wikidata":"https://www.wikidata.org/wiki/Q644307","display_name":"Constant false alarm rate","level":2,"score":0.6304487586021423},{"id":"https://openalex.org/C95623464","wikidata":"https://www.wikidata.org/wiki/Q1096149","display_name":"Classifier (UML)","level":2,"score":0.5551651120185852},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5393689870834351},{"id":"https://openalex.org/C137524506","wikidata":"https://www.wikidata.org/wiki/Q2247688","display_name":"Anomaly-based intrusion detection system","level":3,"score":0.5300416946411133},{"id":"https://openalex.org/C45942800","wikidata":"https://www.wikidata.org/wiki/Q245652","display_name":"Ensemble learning","level":2,"score":0.47537150979042053},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.4751558005809784},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.45006242394447327},{"id":"https://openalex.org/C95922358","wikidata":"https://www.wikidata.org/wiki/Q5432725","display_name":"False positive rate","level":2,"score":0.44651830196380615},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.4232971668243408},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.39498651027679443},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.0881853699684143}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1007/s44163-024-00120-9","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s44163-024-00120-9","pdf_url":"https://link.springer.com/content/pdf/10.1007/s44163-024-00120-9.pdf","source":{"id":"https://openalex.org/S4210220416","display_name":"Discover Artificial Intelligence","issn_l":"2731-0809","issn":["2731-0809"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Discover Artificial Intelligence","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:3d67374ba76942b89626e423748e3a60","is_oa":true,"landing_page_url":"https://doaj.org/article/3d67374ba76942b89626e423748e3a60","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Discover Artificial Intelligence, Vol 4, Iss 1, Pp 1-20 (2024)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1007/s44163-024-00120-9","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s44163-024-00120-9","pdf_url":"https://link.springer.com/content/pdf/10.1007/s44163-024-00120-9.pdf","source":{"id":"https://openalex.org/S4210220416","display_name":"Discover Artificial Intelligence","issn_l":"2731-0809","issn":["2731-0809"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Discover Artificial Intelligence","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.6299999952316284}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W4394855752.pdf"},"referenced_works_count":53,"referenced_works":["https://openalex.org/W433644524","https://openalex.org/W1487268095","https://openalex.org/W1525563108","https://openalex.org/W1981738628","https://openalex.org/W1999616751","https://openalex.org/W2001107211","https://openalex.org/W2017420094","https://openalex.org/W2044624565","https://openalex.org/W2047408376","https://openalex.org/W2066832805","https://openalex.org/W2108118522","https://openalex.org/W2142889610","https://openalex.org/W2335999708","https://openalex.org/W2465068856","https://openalex.org/W2516066574","https://openalex.org/W2540497447","https://openalex.org/W2598811698","https://openalex.org/W2606539965","https://openalex.org/W2762776925","https://openalex.org/W2789654058","https://openalex.org/W2792850657","https://openalex.org/W2807319534","https://openalex.org/W2840169530","https://openalex.org/W2889109290","https://openalex.org/W2890474333","https://openalex.org/W2904539465","https://openalex.org/W2908818413","https://openalex.org/W2926701059","https://openalex.org/W2937220155","https://openalex.org/W2939087234","https://openalex.org/W2954985889","https://openalex.org/W2966972068","https://openalex.org/W2981025625","https://openalex.org/W2983800303","https://openalex.org/W3025126107","https://openalex.org/W3038674659","https://openalex.org/W3038955483","https://openalex.org/W3047132966","https://openalex.org/W3091379954","https://openalex.org/W3093410479","https://openalex.org/W3111390419","https://openalex.org/W3131541364","https://openalex.org/W3135091917","https://openalex.org/W3171154553","https://openalex.org/W3185895012","https://openalex.org/W3208564340","https://openalex.org/W3211805421","https://openalex.org/W3217567704","https://openalex.org/W4200127250","https://openalex.org/W4285730868","https://openalex.org/W4288767720","https://openalex.org/W4294022955","https://openalex.org/W4297517590"],"related_works":["https://openalex.org/W2337148208","https://openalex.org/W3004832009","https://openalex.org/W3036013726","https://openalex.org/W1971929717","https://openalex.org/W1724519426","https://openalex.org/W2351051591","https://openalex.org/W2369534771","https://openalex.org/W4205383432","https://openalex.org/W2352639800","https://openalex.org/W3112374511"],"abstract_inverted_index":{"Abstract":[0],"The":[1,161],"increasing":[2],"complexity":[3],"and":[4,44,158,209],"adversity":[5],"of":[6,96,102,108,117,169,177,187],"cyber-attacks":[7],"have":[8],"prompted":[9],"discussions":[10],"in":[11,90,203],"the":[12,56,71,82,87,105,109,114,120,123,129,134,141,148,180,197],"cyber":[13],"scenario":[14],"for":[15,133,155],"a":[16,21,27,165,173,184,191],"prognosticate":[17],"approach,":[18],"rather":[19],"than":[20],"reactionary":[22],"one.":[23],"In":[24],"this":[25],"paper,":[26],"signature-based":[28],"intrusion":[29,50],"detection":[30,51,116,153,185],"system":[31],"has":[32],"been":[33],"built":[34,53],"based":[35,54],"on":[36,55,128,140],"C5":[37,83,121,162],"classifiers,":[38],"to":[39,62,74,113,145],"classify":[40],"packets":[41],"into":[42,70,81],"normal":[43],"attack":[45],"categories.":[46],"Next,":[47],"an":[48],"anomaly-based":[49],"was":[52],"LSTM":[57,135,181],"(Long-Short":[58],"Term":[59],"Memory)":[60],"algorithm":[61],"detect":[63],"anomalies.":[64],"These":[65,77],"anomalies":[66],"are":[67],"then":[68],"fed":[69],"signature":[72],"generator":[73],"extract":[75],"attributes.":[76],"attributes":[78],"get":[79],"uploaded":[80],"training":[84,217],"set,":[85],"aiding":[86],"ensemble":[88,110],"model":[89,111,125,182,199],"continual":[91],"learning":[92],"with":[93],"expanding":[94],"signatures":[95,101],"unknown":[97,103,159],"attacks.":[98,118,160],"By":[99],"generating":[100],"attacks,":[104],"self-healing":[106],"attribute":[107],"contributes":[112],"early":[115],"For":[119],"classifier,":[122],"proposed":[124,198],"is":[126,138],"evaluated":[127,139],"UNSW-NB15":[130],"dataset,":[131],"while":[132,171,189],"model,":[136],"it":[137,210],"ADFA-LD":[142],"dataset.":[143],"Compared":[144],"conventional":[146],"models,":[147],"experimental":[149],"results":[150],"show":[151],"better":[152],"rates":[154],"both":[156],"known":[157],"classifier":[163],"achieved":[164,183],"True":[166],"Positive":[167],"Rate":[168],"97%":[170],"maintaining":[172],"false":[174],"positive":[175],"rate":[176,186],"8%.":[178],"Also,":[179],"90%":[188],"retaining":[190],"17%":[192],"False":[193],"Alarm":[194],"Rate.":[195],"As":[196],"learns,":[200],"its":[201],"performance":[202],"real":[204],"network":[205],"traffic":[206],"also":[207,211],"improves":[208],"eliminates":[212],"human":[213],"intervention":[214],"when":[215],"updating":[216],"data.":[218]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":8},{"year":2024,"cited_by_count":1}],"updated_date":"2026-03-18T14:38:29.013473","created_date":"2025-10-10T00:00:00"}
